How Certificate Trusts Work and Why They Are Causing Trouble
VSEC Blog
by
3y ago
If you ask most people who work in our industry to describe the difference between HTTP and HTTPS, they might say the latter is the secure version. They may even go further and explain that HTTPS uses an SSL certificate to secure the connection between the user’s web-browser and the web-server hosting the web-page.   But surprisingly, many do not know the details of how an SSL certificate works; the reliance on third-party trust, and why we will soon be facing a wave of problems with root certificates expiring ..read more
Visit website
Entrust Datacard Passwordless Webinar Series this Summer!
VSEC Blog
by
4y ago
..read more
Visit website
Infinigate Appoints Justin Griffiths as UK Managing Director
VSEC Blog
by
4y ago
Griffiths brings 26 years of IT experience to lead Infinigate UK from 1st August 2020.   ..read more
Visit website
As The World Changed Forever, So Did Cybercriminal Behaviour
VSEC Blog
by
4y ago
The global COVID-19 pandemic fundamentally transformed how we live, work and interact with one another. As organisations across the world re-architect how their workforces securely connect and communicate in the new work reality, it's never been more important to stay abreast of the fast-moving cyber threat landscape ..read more
Visit website
COVID-19: Ruthless Ransomware Authors Attack Hospitals
VSEC Blog
by David Balaban
4y ago
The Coronavirus outbreak continues to hold the entire world hostage, and healthcare facilities are at the forefront of this struggle. The fact that hospitals and pharmaceutical labs are overwhelmed with work and research makes them more vulnerable to malware attacks than ever before. Saving lives is their top priority and everything else comes next. Malicious actors don’t seem to care about the importance of these commendable efforts, though. They are waging a cyberwar against medical organizations as if the COVID-19 emergency weren’t underway ..read more
Visit website
How Certificate Trusts Work and Why They Are Causing Trouble
VSEC Blog
by
4y ago
If you ask most people who work in our industry to describe the difference between HTTP and HTTPS, they might say the latter is the secure version. They may even go further and explain that HTTPS uses an SSL certificate to secure the connection between the user’s web-browser and the web-server hosting the web-page.   But surprisingly, many do not know the details of how an SSL certificate works; the reliance on third-party trust, and why we will soon be facing a wave of problems with root certificates expiring ..read more
Visit website
How Secure is Zoom and Should I Be Using It?
VSEC Blog
by
4y ago
There are a few businesses which have been proven to thrive in the conditions we find ourselves in today; and telecommunications companies are one of them. Whether it be Zoom, Webex, GoToMeeting or any other provider of teleconferencing software, the demand for such solutions and services have soared, as large swathes of the population now adjust to new working from home requirements ..read more
Visit website
How to Secure Your Remote Access from the Changing Threat Landscape
VSEC Blog
by Dion Phillips
4y ago
As COVID-19 spreads and major cities go into lock down, more and more businesses are sending employees home to work remotely. The need for social distancing has become very real very quickly and has seen companies scrambling to implement remote access solutions as quickly as possible ..read more
Visit website
Five Considerations for a COVID-19 Ready Mobile Workforce
VSEC Blog
by
4y ago
We live in unprecedented times. Despite there being a number of occasions in recorded history where ah a medical emergency has befallen humanity; there has never been so many of us and never has there been such disruption to our economically interconnected world ..read more
Visit website
Zigbee IoT Vulnerabilities Let the Side Down... AGAIN
VSEC Blog
by
4y ago
Recent research carried out by Check Point white hats has exposed a vulnerability in the Philips Hue lighting system, which utilises the Zigbee wireless protocol, and could compromise both home and corporate networks ..read more
Visit website

Follow VSEC Blog on FeedSpot

Continue with Google
Continue with Apple
OR